General

  • Target

    temp_eno.hta

  • Size

    1KB

  • Sample

    230124-2qx5tsea97

  • MD5

    2552f7a77b1834ebc2c62e2f9432e54c

  • SHA1

    eedee537ce4bcc252358a1e1a8687b2e50ed19f8

  • SHA256

    28deee1dd68bfd6a75ca2794fcae30fa3d349afa4e4bbf5bf8382eefc10a81cf

  • SHA512

    5218336d8fb62e68b44a2469ea3cb24b5c94168cc16e9619f6929f75108c36ecabafc8bc6eac1ea4391a88f493543bc8e301c5f74ee30eda135aaed1caecb1fb

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

mikludoykxx.ddns.net:6606

mikludoykxx.ddns.net:7707

mikludoykxx.ddns.net:8808

mikeludomax.ddns.net:6606

mikeludomax.ddns.net:7707

mikeludomax.ddns.net:8808

mikeludoyyxx.ddns.net:6606

mikeludoyyxx.ddns.net:7707

mikeludoyyxx.ddns.net:8808

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      temp_eno.hta

    • Size

      1KB

    • MD5

      2552f7a77b1834ebc2c62e2f9432e54c

    • SHA1

      eedee537ce4bcc252358a1e1a8687b2e50ed19f8

    • SHA256

      28deee1dd68bfd6a75ca2794fcae30fa3d349afa4e4bbf5bf8382eefc10a81cf

    • SHA512

      5218336d8fb62e68b44a2469ea3cb24b5c94168cc16e9619f6929f75108c36ecabafc8bc6eac1ea4391a88f493543bc8e301c5f74ee30eda135aaed1caecb1fb

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Async RAT payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks